1. My "port-mirroring" is based on libpcap, it does have ipv6 support. 2. Different to the "TEE" target, "port-mirroring" encapsulates a whole packet including ethernet headers using TSZP protocol http://en.wikipedia.org/wiki/TZSP. However, "TEE" modifies the original packet's ethernet headers to forward it, hence you can not get the original mac addresses.
On Tue, Mar 19, 2013 at 9:44 PM, Stefan Hellermann <ste...@the2masters.de>wrote: > 2013/3/19 Wei Geng <gengw2...@gmail.com>: > > This "port-mirroring" package can mirror traffic of adapter(s) to another > > adapter or to a remote computer, which is useful for a network sniffer > > to analysis your network. > > What's the difference to the netfilter TEE target? In the > configuration I can see a target IP address, is the destination of > every packet mangled? IPv6? Is it possible to route the mirrored > traffic? This is not possible with the netfilter TEE target. > Or do you resolv the target IP to a MAC-Address and copy every packet > to this Layer-2 address? > I think it's important to highlight the differences to netfilter TEE. > > Regards, > Stefan Hellermann > _______________________________________________ > openwrt-devel mailing list > openwrt-devel@lists.openwrt.org > https://lists.openwrt.org/mailman/listinfo/openwrt-devel >
_______________________________________________ openwrt-devel mailing list openwrt-devel@lists.openwrt.org https://lists.openwrt.org/mailman/listinfo/openwrt-devel